-
1
-
-
0037880329
-
-
Technical Report HPL-2002-57, HP Labs, March, Available at
-
D. S. Milojicic, V. Kalogeraki, R. Lukose, K. Nagaraja, J. Pruyne, B. Richard, S. Rollins, and Z. Xu. Peer-to-peer computing. Technical Report HPL-2002-57, HP Labs, March 2002. Available at http://www.hpl.hp.com/techreports/2002/HPL-2002-57.html
-
(2002)
Peer-to-peer computing
-
-
Milojicic, D.S.1
Kalogeraki, V.2
Lukose, R.3
Nagaraja, K.4
Pruyne, J.5
Richard, B.6
Rollins, S.7
Xu, Z.8
-
3
-
-
33750040628
-
-
Available at
-
Trusted Computing Group. TCG software stack specificiation version 1.1, 2003. Available at https://www.trustedcomputinggroup.org/downloads/specifications
-
(2003)
TCG software stack specificiation version 1.1
-
-
-
6
-
-
84955566566
-
Aprivacy-enhanced peer-to-peer reputation system
-
K. Bauknecht, A. M. Tjoa, and G. Quirchmayr, eds, Springer-Verlag, Berlin
-
M. Kinateder and S. Pearson.Aprivacy-enhanced peer-to-peer reputation system. In K. Bauknecht, A. M. Tjoa, and G. Quirchmayr, eds, Proceedings of EC-Web 2003, volume 2738 of Lecture Notes in Computer Science, pp. 206-216, Springer-Verlag, Berlin, 2003.
-
(2003)
Proceedings of EC-Web 2003, volume 2738 of Lecture Notes in Computer Science
, pp. 206-216
-
-
Kinateder, M.1
Pearson, S.2
-
9
-
-
17544377746
-
Oceanstore: An architecture for global-scale persistent storage
-
ACM Press, New York, November
-
J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, W. Weimer, C. Wells, and B. Zhao. Oceanstore: an architecture for global-scale persistent storage. In Proceedings of the 9th international Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2000), pp. 190-201, ACM Press, New York, November 2000.
-
(2000)
Proceedings of the 9th international Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2000)
, pp. 190-201
-
-
Kubiatowicz, J.1
Bindel, D.2
Chen, Y.3
Czerwinski, S.4
Eaton, P.5
Geels, D.6
Gummadi, R.7
Rhea, S.8
Weatherspoon, H.9
Weimer, W.10
Wells, C.11
Zhao, B.12
-
10
-
-
0036953821
-
Squirrel: A decentralized peer-to-peer web cache
-
ACM Press, New York
-
S. Iyer, A. Rowstron, and P. Druschel. Squirrel: a decentralized peer-to-peer web cache. In Proceedings of the 21st Annual Symposium on Principles of Distributed Computing, pp. 213-222, ACM Press, New York, 2002.
-
(2002)
Proceedings of the 21st Annual Symposium on Principles of Distributed Computing
, pp. 213-222
-
-
Iyer, S.1
Rowstron, A.2
Druschel, P.3
-
11
-
-
0036802048
-
Scribe: A largescale and decentralised application-level multicast infrastructure
-
M. Castro, P. Druschel, A. M. Kermarrec, and A. Rowstron. Scribe: a largescale and decentralised application-level multicast infrastructure. IEEE Journal on Selected Areas in Communications, 20(8):1489-1499, 2002.
-
(2002)
IEEE Journal on Selected Areas in Communications
, vol.20
, Issue.8
, pp. 1489-1499
-
-
Castro, M.1
Druschel, P.2
Kermarrec, A.M.3
Rowstron, A.4
-
12
-
-
35248845972
-
Open problems in data-sharing peer-to-peer systems
-
D. Calvanese, M. Lenzerini, and R. Motwani, eds, Springer-Verlag, Berlin
-
N. Daswani, H. Garcia-Molina, and B. Yang. Open problems in data-sharing peer-to-peer systems. In D. Calvanese, M. Lenzerini, and R. Motwani, eds, Proceedings of the 9th International Conference on Database Theory (ICDT’03), volume 2572 of Lecture Notes in Computer Science, pp. 1-15, Springer-Verlag, Berlin, 2003.
-
(2003)
Proceedings of the 9th International Conference on Database Theory (ICDT’03), volume 2572 of Lecture Notes in Computer Science
, pp. 1-15
-
-
Daswani, N.1
Garcia-Molina, H.2
Yang, B.3
-
13
-
-
33845373081
-
A survey of peer-to-peer security issues
-
M. Okada, B. C. Pierce, A. Scedrov, H. Tokuda, and A. Yonezawa, eds, Springer-Verlag, Berlin
-
D. S. Wallach. A survey of peer-to-peer security issues. In M. Okada, B. C. Pierce, A. Scedrov, H. Tokuda, and A. Yonezawa, eds, Proceeding of the International Symposium on Software Security - Theories and Systems (ISSS 2002), volume 2609 of Lecture Notes in Computer Science, pp. 42-57, Springer-Verlag, Berlin, 2003.
-
(2003)
Proceeding of the International Symposium on Software Security - Theories and Systems (ISSS 2002), volume 2609 of Lecture Notes in Computer Science
, pp. 42-57
-
-
Wallach, D.S.1
-
16
-
-
0038011186
-
A reputation-based approach for choosing reliable resources in peerto- peer networks
-
V. Atluri, ed, ACM Press, New York
-
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, and F. Violante. A reputation-based approach for choosing reliable resources in peerto- peer networks. In V. Atluri, ed., Proceedings of the 9th ACM conference on Computer and Communications Security, pp. 207-216. ACM Press, New York, 2002.
-
(2002)
Proceedings of the 9th ACM conference on Computer and Communications Security
, pp. 207-216
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
Violante, F.5
-
17
-
-
84947273682
-
The Sybil attack
-
P. Druschel, M. F. Kaashoek, and A. I. T. Rowstron, eds, Springer-Verlag, Berlin
-
J. R. Douceur. The Sybil attack. In P. Druschel, M. F. Kaashoek, and A. I. T. Rowstron, eds, Proceedings of the 1st InternationalWorkshop on Peer-to-Peer systems, (IPTPS 2002), volume 2429 of Lecture Notes in Computer Science, pp. 251-256, Springer-Verlag, Berlin, 2002.
-
(2002)
Proceedings of the 1st InternationalWorkshop on Peer-to-Peer systems, (IPTPS 2002), volume 2429 of Lecture Notes in Computer Science
, pp. 251-256
-
-
Douceur, J.R.1
-
18
-
-
10044267860
-
Beyond ‘web of trust’: Enabling P2P e-commerce
-
IEEE Computer Society Press, Los Alamites, CA, June
-
A. Datta, M. Hauswirth, and K. Aberer. Beyond ‘web of trust’: enabling P2P e-commerce. In Proceedings of the IEEE Conference on Electronic Commerce (CEC’03), pp. 303-312, IEEE Computer Society Press, Los Alamites, CA, June 2003.
-
(2003)
Proceedings of the IEEE Conference on Electronic Commerce (CEC’03)
, pp. 303-312
-
-
Datta, A.1
Hauswirth, M.2
Aberer, K.3
-
19
-
-
0002101577
-
Reputation systems
-
P. Resnick, K. Kuwabara, R. Zeckhauser, and E. Friedman. Reputation systems. Communications of the ACM, 43(12):45-48, 2000.
-
(2000)
Communications of the ACM
, vol.43
, Issue.12
, pp. 45-48
-
-
Resnick, P.1
Kuwabara, K.2
Zeckhauser, R.3
Friedman, E.4
-
21
-
-
12444308748
-
Accountability
-
A Oram, ed, O. Relly & Associates, Inc
-
R. Dingledine, M. J. Freedman, and D. Molnar. Accountability. In A Oram, ed., Peer-to-peer: Harnessing the Power of Disruptive Technologies In [2], pp. 171-213, O. Relly & Associates, Inc., 2001.
-
(2001)
Peer-to-peer: Harnessing the Power of Disruptive Technologies
, Issue.2
, pp. 171-213
-
-
Dingledine, R.1
Freedman, M.J.2
Molnar, D.3
-
22
-
-
85013598742
-
Free haven
-
Oram ed, O. Reilly & Associates, Inc
-
D. Molnar, R. Dingledine, and M. J. Freedman. Free haven. In Oram ed., Peer-topeer: Harnessing the Power of Disruptive Technologies, pp. 102-120, O. Reilly & Associates, Inc., 2001.
-
(2001)
Peer-topeer: Harnessing the Power of Disruptive Technologies
, pp. 102-120
-
-
Molnar, D.1
Dingledine, R.2
Freedman, M.J.3
-
23
-
-
33744479345
-
Freenet: A distributed anonymous information storage and retrieval system
-
H. Federrath, ed, Springer-Verlag, Berlin
-
I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong. Freenet: a distributed anonymous information storage and retrieval system. In H. Federrath, ed., Proceedings of the International Workshop on Design Issues in Anonymity and Unobservability, volume 2009 of Lecture Notes in Computer Science, pp. 46-66, Springer-Verlag, Berlin, 2001.
-
(2001)
Proceedings of the International Workshop on Design Issues in Anonymity and Unobservability, volume 2009 of Lecture Notes in Computer Science
, pp. 46-66
-
-
Clarke, I.1
Sandberg, O.2
Wiley, B.3
Hong, T.W.4
-
24
-
-
79959228041
-
Identity crisis: Anonymity vs. reputation in P2P systems
-
IEEE Computer Society Press, Los Alamitos, CA, September
-
S. Marti and H. Garcia-Molina. Identity crisis: anonymity vs. reputation in P2P systems. In Proceedings of the 3rd International Conference on Peer-to-Peer Computing, pp. 134-141, IEEE Computer Society Press, Los Alamitos, CA, September 2003.
-
(2003)
Proceedings of the 3rd International Conference on Peer-to-Peer Computing
, pp. 134-141
-
-
Marti, S.1
Garcia-Molina, H.2
-
25
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. L. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84-88, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.L.1
-
26
-
-
33751546569
-
Practical anonymity for the masses with Mixnetworks
-
IEEE Computer Society Press, Los Alamitos, CA, June
-
M. Rennhard and B. Plattner. Practical anonymity for the masses with Mixnetworks. In Proceedings of the IEEE 8th International Workshop on Enterprise Security (WETICE’03), pp. 255-260, IEEE Computer Society Press, Los Alamitos, CA, June 2003.
-
(2003)
Proceedings of the IEEE 8th International Workshop on Enterprise Security (WETICE’03)
, pp. 255-260
-
-
Rennhard, M.1
Plattner, B.2
-
28
-
-
0030676973
-
Anonymous connections and onion routing
-
IEEE Press, New York
-
P. F. Syverson, D. M. Goldschlag, and M. G. Reed. Anonymous connections and onion routing. In Proceedings of IEEE Symposium on Security and Privacy, pp. 44-54, IEEE Press, New York, 1997.
-
(1997)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 44-54
-
-
Syverson, P.F.1
Goldschlag, D.M.2
Reed, M.G.3
-
29
-
-
11844265607
-
Towards an access control system for mobile peer-to-peer collaborative environments
-
IEEE Computer Society Press, Los Alamitos, CA, June
-
P. Fenkam, S. Dustdar, E. Kirda, H. Gall, and G. Reif. Towards an access control system for mobile peer-to-peer collaborative environments. In Proceedings of the IEEE 11th InternationalWorkshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2002), pp. 95-101, IEEE Computer Society Press, Los Alamitos, CA, June 2002.
-
(2002)
Proceedings of the IEEE 11th InternationalWorkshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2002)
, pp. 95-101
-
-
Fenkam, P.1
Dustdar, S.2
Kirda, E.3
Gall, H.4
Reif, G.5
-
30
-
-
14844295011
-
Direct anonymous attestation
-
V. Atluri, B. Pfitzmann, and P. McDaniel, eds, October
-
L. Chen, E. Brickell, and J. Camenisch. Direct anonymous attestation. In V. Atluri, B. Pfitzmann, and P. McDaniel, eds, Proceedings of the 11th ACM Conference on Computer and Communications Security, (CCS 2004), October 2004.
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security, (CCS 2004)
-
-
Chen, L.1
Brickell, E.2
Camenisch, J.3
-
31
-
-
35248839965
-
A signature scheme with efficient protocols
-
S. Cimato, C. Galdi, and G. Persiano, eds, Springer-Verlag, Berlin
-
J. Camenisch and A. Lysyanskaya. A signature scheme with efficient protocols. In S. Cimato, C. Galdi, and G. Persiano, eds, Proceedings of the 3rd International Conference on Security in Communication Networks, (SCN 2002), volume 2576 of Lecture Notes in Computer Science, pp. 268-289. Springer-Verlag, Berlin, 2003.
-
(2003)
Proceedings of the 3rd International Conference on Security in Communication Networks, (SCN 2002), volume 2576 of Lecture Notes in Computer Science
, pp. 268-289
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
34
-
-
84872375897
-
-
Available at
-
Trusted Computing Group. TPM main: part 3 commands, 2003. Available at https://www.trustedcomputinggroup.org/downloads/specifications
-
(2003)
TPM main: Part 3 commands
-
-
-
35
-
-
70749096362
-
-
Available at
-
Trusted Computing Group. TPM main: part 1 design principles, 2003. Available at https://www.trustedcomputinggroup.org/downloads/specifications
-
(2003)
TPM main: Part 1 design principles
-
-
-
36
-
-
46449098241
-
-
Technical Report, Computer Science Department, Stanford University
-
N. Daswani, P. Golle, S. Marti, H. Garcia-Molina, and D. Boneh. Evaluating reputation systems for document authenticity. Technical Report, Computer Science Department, Stanford University, 2003.
-
(2003)
Evaluating reputation systems for document authenticity
-
-
Daswani, N.1
Golle, P.2
Marti, S.3
Garcia-Molina, H.4
Boneh, D.5
|